Program Obfuscation with Leaky Hardware
From MaRDI portal
Publication:3102218
DOI10.1007/978-3-642-25385-0_39zbMath1227.68023OpenAlexW1594985992MaRDI QIDQ3102218
Yael Tauman Kalai, Shai Halevi, Nir Bitansky, Ran Canetti, Guy N. Rothblum
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_39
Related Items (5)
How to Compute in the Presence of Leakage ⋮ Weakening the Isolation Assumption of Tamper-Proof Hardware Tokens ⋮ The pseudorandom oracle model and ideal obfuscation ⋮ Classical leakage resilience from fault-tolerant quantum computation ⋮ Leakage-Resilient Coin Tossing
This page was built for publication: Program Obfuscation with Leaky Hardware